Three NVIDIA vulnerabilities allow unauthorised users to obtain the IPC memory key and use it to craft malicious inference requests. Read more »
Layers of link wrapping hide malicious URLs used for phishing. Learn how to protect against link wrapping attacks. Read more »
Cloudflare is accusing Perplexity of using stealth crawlers to bypass site restrictions, triggering fresh concerns over how AI firms access web content. Read more »
In this TechRepublic interview, researcher Amy Chang details the decomposition method and shares how organizations can protect themselves from LLM data extraction. Read more »
The application was exploited by at least three state-sponsored Chinese threat groups last month. Read more »
Learn ethical hacking, network scanning, and real-world tools to stand out in the cybersecurity job market. Read more »
Cyber extortion group World Leaks released more than 1.3TB of internal Dell data, including scripts and backups. Dell insists no sensitive customer information was exposed. Read more »
Federal agencies warn of rising Interlock ransomware attacks targeting healthcare and critical sectors using double extortion and advanced social engineering. Read more »
A series of cyberattacks targeting Microsoft collaboration software, specifically SharePoint, have been linked to Chinese hackers and threat actors. Read more »
Threat actors exploit SharePoint flaws to access internal systems, steal sensitive data, and carry out surveillance, impersonation, and extortion. Read more »
